Contact Us

Blog

image
01 May 2022

Your Azure Cloud is Vulnerable to Subdomain Takeover

In its first month, EZMonitor found over 30000 Azure domains vulnerable to domain takeover. This detection has helped hundreds of companies detect and prevent phishing attacks before they happen. Check your your domains for free with EZMonitor.

image
15 Apr 2022

Detect Phishing and Man in the Middle Attacks Before They Happen

With the rush to market, many IoT manufacturers are hard-coding passwords for IoT Devices to communicate with their command-and-control servers. The problem with this is that if a hacker guesses the password gets access to your whole fleet. In this blog we show how EZCA can help you save that problem with one click.

image
31 Mar 2022

Get ADCS Ready for Cloud Scale

With the rush to market, many IoT manufacturers are hard-coding passwords for IoT Devices to communicate with their command-and-control servers. The problem with this is that if a hacker guesses the password gets access to your whole fleet. In this blog we show how EZCA can help you save that problem with one click.

image
15 Mar 2022

IoT Password Authentication Is One Click Away

With the rush to market, many IoT manufacturers are hard-coding passwords for IoT Devices to communicate with their command-and-control servers. The problem with this is that if a hacker guesses the password gets access to your whole fleet. In this blog we show how EZCA can help you save that problem with one click.

image
01 Mar 2022

Secure Your Cloud with Keytos and Azure Sentinel

To reduce the time to mitigate and improve your threat hunting abilities, we are happy to announce that all Keytos products are now able to send security information to Azure Sentinel. Enabling this SIEM connection is one more way that we help your organization stay secure against the ever evolving threats.